This executable is made to be executed in the cobalt strike session by making use of the executing assembly. From the Active Directory, it will retrieve a LAPS password.

Require (either):

  • An account with ExtendedRight or Generic All Rights
  • Domain Admin privilege

This tool was created only for educational purposes and not for any illegal purposes. The developer of this tool is not responsible for the misuse of the tool and the consequences that may follow.

Download Link: https://github.com/swisskyrepo/SharpLAPS